skip to main content
article

Applying biometrics to design three-factor remote user authentication scheme with key agreement

Published: 01 October 2014 Publication History

Abstract

There are some biometrics-based three-factor remote user authentication schemes proposed by researchers for ensure high security features for network-based application systems. Recently, Das pointed out the security flaws of Li and Hwang's three-factor remote user authentication scheme, and proposed an enhanced biometrics-based three-factor remote user authentication scheme. Das's scheme overcomes the defects of Li and Hwang's scheme, and maintains the advantages of Li and Hwang's scheme at the same time. However, after detailed analysis, we find that Das's scheme remains vulnerable to forgery attack and stolen smart card attack; at the same time, Das's scheme cannot provide the session key agreement after the mutual authentication. To provide more security features, we design a three-factor remote user authentication scheme with key agreement using biometrics. Copyright © 2013 John Wiley & Sons, Ltd.

References

[1]
Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; Volume 24 Issue 11: pp.770-772.
[2]
Chang C, Wu T. Remote password authentication with smart cards. IEE Proceedings - E Computers & Digital Techniques 1991; Volume 138 Issue 3: pp.165-168.
[3]
Haller NM. The S/Key TM one-time password system. In: Proceeding Internet Society Symposium on Network and Distributed System Security 1994; pp.151-158.
[4]
Wang S, Chang T. Smart card based secure password authentication scheme. Computers & Security 1996; Volume 15 Issue 3: pp.231-237.
[5]
Hwang MS, Li LH. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; Volume 46 Issue 1: pp.28-30.
[6]
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; Volume 32 Issue 1: pp.469-472.
[7]
Chan CK, Cheng LM. Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; Volume 46 Issue 4: pp.992-993.
[8]
Chang CC, Hwang KF. Some forgery attacks on a remote user authentication scheme using smart cards. Informatica 2003; Volume 14 Issue 3: pp.289-294.
[9]
Yeh HT, Sun HM, Hsieh BT. Security of a remote user authentication scheme using smart cards. IEICE Transactions on Communications 2004; Volume E87-B Issue 1: pp.192-194.
[10]
Lee SW, Kim HS, Yoo KY. Efficient nonce-based remote user authentication scheme using smart cards. Applied Mathematics and Computation 2005; Volume 167 Issue 1: pp.355-361.
[11]
Kim SK, Chung MG. More secure remote user authentication scheme. Computer Communications 2009; Volume 32 Issue 6: pp.1018-1021.
[12]
Liu JY, Zhou AM, Gao MX. A new mutual authentication scheme based on nonce and smart cards. Computer Communications 2008; Volume 31 Issue 10: pp.2205-2209.
[13]
Shen JJ, Lin CW, Hwang MS. Security enhancement for the timestamp based password authentication scheme using smart cards. Computers & Security 2003; Volume 22 Issue 7: pp.591-595.
[14]
Sun HM. An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; Volume 46 Issue 4: pp.958-961.
[15]
Wu ST, Chieu BC. A user friendly remote authentication scheme with smart cards. Computers & Security 2003; Volume 22 Issue 6: pp.547-550.
[16]
Fan CI, Chan YC, Zhang ZK. Robust remote authentication scheme with smart cards. Computer & security 2005; Volume 24 Issue 8: pp.619-628.
[17]
Liao YP, Wang SS. A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 2009; Volume 31 Issue 1: pp.24-29.
[18]
Lin IC, Hwang MS, Li LH. A new remote user authentication scheme for multi-server architecture. Future Generation Computer Systems 2003; Volume 19 Issue 1: pp.13-22.
[19]
Lee JK, Ryu SR, Yoo KY. Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters 2002; Volume 38 Issue 12: pp.554-555.
[20]
Lin CH, Lai YY. A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces 2004; Volume 27 Issue 1: pp.19-23.
[21]
Chang CC, Lin IC. Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Operating Systems Review 2004; Volume 38 Issue 4: pp.91-96.
[22]
Kim HS, Lee SW, Yoo KY. ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review 2003; Volume 37 Issue 4: pp.32-41.
[23]
Scott M. Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review 2004; Volume 38 Issue 2: pp.73-75.
[24]
Khan MK, Zhang JS. Improving the security of 'a flexible biometrics remote user authentication scheme'. Computer Standards & Interfaces 2007; Volume 29 Issue 1: pp.82-85.
[25]
Li CT, Hwang MS. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010; Volume 33 Issue 1: pp.1-5.
[26]
Schneier B. Applied Cryptography second edn. Wiley: New York, 1996.
[27]
Li X, Niu JW, Ma J, Wang WD, Liu CL. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2011; Volume 34 Issue 1: pp.73-79.
[28]
Das AK. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security 2011; Volume 5 Issue 3: pp.145-151.
[29]
Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Advances in Cryptology, Eurocrypt2004, LNCS 3027 2004; pp 523-540.
[30]
Kocher P, Jaffe J, Jun B. Differential power analysis. Proceeeding of Advances in Cryptology CRYPTO'99, LNCS 1666 1999; pp: 388-397.
[31]
Messergers TS, Dabbish EA, Sloan RH. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; Volume 5 Issue 5: pp.541-552.
[32]
Li X, Xiong YP, Ma J, Wang WD. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2012; Volume 35 Issue 2: pp.763-769.
[33]
Li X, Ma J, Wang WD, Xiong YP, Zhang JS. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Mathematical and Computer Modelling 2012.
[34]
Sarkar P, Saha A. Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs. Journal of Convergence 2011; Volume 2 Issue 1: pp.23-30.
[35]
Tseng FH, Chou LD, Chao HC. A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences 2011; Volume 1: pp.4.

Cited By

View all
  1. Applying biometrics to design three-factor remote user authentication scheme with key agreement

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Security and Communication Networks
    Security and Communication Networks  Volume 7, Issue 10
    October 2014
    202 pages
    ISSN:1939-0114
    EISSN:1939-0122
    Issue’s Table of Contents

    Publisher

    John Wiley & Sons, Inc.

    United States

    Publication History

    Published: 01 October 2014

    Author Tags

    1. authentication
    2. biometrics
    3. cryptanalysis
    4. key agreement
    5. smart card

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 17 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media